Course Overview

In this course, you will start as a beginner without any previous knowledge about the hacking, the course focuses on the practical side and the theoretical side to ensure that you understand the idea before you apply it.

This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become an expert level, and if you are a professional so this course will increase your knowledge about the hacking. In this course you'll learn how the black hat hackers hacks Windows OS using advanced techniques, and also you'll learn how the white hat hackers Secure Windows OS by analyzing it, and how to detect the hackers identity. Learn how to detect any kind of the attacks that we've learned and how to prevent yourself and your Windows OS from it, so i this section you'll start by learning how to detect any kind of backdoor whether it's combined with an Image, exe, PDF file etc.... using more than method, and also you'll learn how to analyze your Windows OS like experts to check whether it's hacked or not.

Lastly, you'll learn how to prevent yourself from any kind of the attacks that we've learned.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Learn-Hacking-Windows-10-Using-Metasploit-from-Scratch

What You Will Learn

  • Learn Hacking Windows 10 /8.1/8/7/Vista like black hat hackers
  • Learn Securing Windows 10 /8.1/8/7/Vista like white hat hackers
  • Learn preparing your penetration testing lab
  • Learn Linux basics
  • Learn how to use Nmap to gather information
  • Learn how to use Zenmap to gather information
  • Learn interacting with the compromised system via Meterpreter command line
  • Learn the theory behind getting a reverse connection over WAN network
  • Analyze your Windows OS like experts
  • Learn advanced techniques to detect the backdoor
  • Learn to secure your Windows OS

Program Curriculum

  • Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)
  • Installing Kali Linux 2.0 as a Virtual Machine (VMware)
  • Installing Kali Linux 2.0 as ISO Image
  • Setup Windows 10 as a Virtual Machine
  • Setup Metasploitable as a Virtual Machine
  • Configure the Network Settings
  • Connecting Wi-Fi Card to the Virtual Machine
  • Updating Kali Linux
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Introduction
  • Discovering the Connected Clients
  • Scanning the Target OS (Part 1)
  • Scanning the Target OS (Part 2)
  • Scanning the Target OS using GUI
  • Chapter 1 Quiz

  • Gaining Access Introduction
  • Metasploit Fundamentals
  • Creating a Payload using Msfvenom
  • Creating an Encoded Payload using Msfvenom
  • Testing the Payload in the Target OS
  • Chapter 3 Quiz

  • Introduction
  • Installing Veil Framework
  • Creating an Undetectable Payload
  • Combine an EXE File with the Payload (1st Method)
  • Combine an EXE File with the Payload (2nd Method)
  • Combine the Payload with an Image PDF MP3 Etc....
  • Combine the Payload with an Excel, Word File
  • Spoofing the Backdoor Extension
  • Chapter 4 Quiz

  • Introduction
  • Interact with the Target Computer (Part 1)
  • Interact with the Target Computer (Part 2)
  • Persist Your Connection in the Target OS
  • Escalate Your Privileges in Windows 10
  • Escalate Your Privileges in Windows 8.1/8/7
  • Migrating the Backdoor with the Running Processes
  • Check the Virtualization Clear Log Event
  • Uninstalling Programs from the Target OS
  • Add/Remove Users and Changing the Admin Password
  • What is Pivoting?
  • Pivot from the Victim System to Own Every Device on the Network (1st Case)
  • Pivot from the Victim System to Own Every Device on the Network (2nd Case)
  • Stealing the Target Wi-Fi Password
  • Capture the Keystrokes of the Target Keyboard
  • Stealing Windows Credentials
  • Cracking the Administrator Password
  • Stealing the Stored Passwords & Visited Websites
  • Recover the Deleted Files from the Target OS
  • Enumerate USB Drive History
  • Redirect the Target from to Any Website
  • Chapter 5 Quiz

  • Introduction
  • Hooking the Target Browser with BeEF
  • Play Any Sound in the Target Browser
  • Capture a Screenshot from the Target Browser
  • Redirect the Target to Any Website
  • Run Any YouTube Video in the Target Browser
  • Stealing the Target Online Accounts with BeEF
  • Integrate Metasploit Framework with BeEF Project
  • Hacking the Target Windows OS Through the Hooked Browser
  • Having Some Fun with BeEF
  • Chapter 6 Quiz

  • Introduction
  • Configuring the Router and Port Forwarding (1st Method)
  • Configure the Backdoor
  • Port Forwarding using VPS SSH Tunnel (2nd Method)
  • Configure BeEF Over WAN Network
  • Chapter 7 Quiz

  • Detect & Kill Any Meterpreter Session
  • Detect the Running Backdoor Manually
  • Detecting the Combined Backdoor with an Image, PDF, Etc...
  • Detecting the Combined Backdoor (MD5 Hash)
  • Encrypting Your Keyboard Keystrokes
  • Analyzing the Network Connections
  • Analyze the Running Processes
  • Detecting the Backdoor using a Sandbox
  • Chapter 8 Quiz

  • Demonstration
  • The Theory
  • The Needed Hardware and Software
  • Installing Needed Software
  • Converting the Commands to Arduino Script (C/C++)
  • Change the Administrator Password and Force Him to Sign Out
  • Fully Control Any Windows OS within 2 Seconds
  • Chapter 9 Quiz
Load more modules

Instructor

Saad Sarraj

Cyber security student and enthusiast. I love to share what I learn. I have a YouTube channel that focuses on Cyber Security called CyberSudo.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8